Privacy-area aware dummy generation algorithms for Location-Based Services

Location-Based Services (LBSs) have been one of the most popular activities in our daily life. Users can send queries to the LBS server easily to learn their surroundings. However, these location-related queries may result in serious privacy concerns since the un-trusted LBS server has all the information about users and may track them in various ways. In this paper, we propose two dummy-based solutions to achieve k-anonymity for privacy-area aware users in LBSs with considering that side information may be exploited by adversaries. We first choose some candidates based on a virtual circle or grid method, then blur these candidates into the final positions of dummy locations based on the entropy-based privacy metric. Security analysis and evaluation results indicate that the V-circle solution can significantly improve the privacy anonymity level. The V-grid solution can further enlarge the cloaking region while keeping similar privacy level.

[1]  Emma Frejinger,et al.  Route Choice Analysis: Data, Models, Algorithms and Applications , 2009 .

[2]  Nitesh Saxena,et al.  Cover locations: availing location-based services without revealing the location , 2011, WPES '11.

[3]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[4]  Qinghua Li,et al.  Achieving k-anonymity in privacy-aware location-based services , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[5]  George Danezis,et al.  Towards an Information Theoretic Metric for Anonymity , 2002, Privacy Enhancing Technologies.

[6]  Walid G. Aref,et al.  Casper*: Query processing for location services without compromising privacy , 2006, TODS.

[7]  Kang G. Shin,et al.  Privacy protection for users of location-based services , 2012, IEEE Wireless Communications.

[8]  Jean-Pierre Hubaux,et al.  Privacy in Mobile Computing for Location-Sharing-Based Services , 2011, PETS.

[9]  Zan Li,et al.  MobiCache: When k-anonymity meets cache , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[10]  Marco Gruteser,et al.  USENIX Association , 1992 .

[11]  Tetsuji Satoh,et al.  An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..

[12]  Chi-Yin Chow,et al.  A peer-to-peer spatial cloaking algorithm for anonymous location-based service , 2006, GIS '06.

[13]  Yuguang Fang,et al.  A game-theoretic approach for achieving k-anonymity in Location Based Services , 2013, 2013 Proceedings IEEE INFOCOM.

[14]  Hua Lu,et al.  PAD: privacy-area aware, dummy-based location privacy in mobile services , 2008, MobiDE '08.

[15]  David K. Y. Yau,et al.  Privacy vulnerability of published anonymous mobility traces , 2010, MobiCom.

[16]  Hui Li,et al.  3PLUS: Privacy-preserving pseudo-location updating system in location-based services , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[17]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[18]  Hui Li,et al.  EPS: Encounter-Based Privacy-Preserving Scheme for Location-Based Services , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).